Report of the Librarian of Congress
Author : Library of Congress
Publisher :
Page : 60 pages
File Size : 33,1 MB
Release : 1900
Category : Government publications
ISBN :
Author : Library of Congress
Publisher :
Page : 60 pages
File Size : 33,1 MB
Release : 1900
Category : Government publications
ISBN :
Author : Mike Kelley
Publisher : MIT Press
Page : 468 pages
File Size : 18,76 MB
Release : 2004-02-06
Category : Art
ISBN : 9780262611985
The second volume of writings by Los Angeles artist Mike Kelley, focusing on his own work. What John C. Welchman calls the "blazing network of focused conflations" from which Mike Kelley's styles are generated is on display in all its diversity in this second volume of the artist's writings. The first volume, Foul Perfection, contained thematic essays and writings about other artists; this collection concentrates on Kelley's own work, ranging from texts in "voices" that grew out of scripts for performance pieces to expository critical and autobiographical writings.Minor Histories organizes Kelley's writings into five sections. "Statements" consists of twenty pieces produced between 1984 and 2002 (most of which were written to accompany exhibitions), including "Ajax," which draws on Homer, Colgate- Palmolive, and Longinus to present its eponymous hero; "Some Aesthetic High Points," an exercise in autobiography that counters the standard artist bio included in catalogs and press releases; and a sequence of "creative writings" that use mass cultural tropes in concert with high art mannerisms—approximating in prose the visual styles that characterize Kelley's artwork. "Video Statements and Proposals" are introductions to videos made by Kelley and other artists, including Paul McCarthy and Bob Flanagan and Sheree Rose. "Image-Texts" offers writings that accompany or are part of artworks and installations. This section includes "A Stopgap Measure," Kelley's zestful millennial essay in social satire, and "Meet John Doe," a collage of appropriated texts. "Architecture" features an discussion of Kelley's Educational Complex (1995) and an interview in which he reflects on the role of architecture in his work. Finally, "Ufology" considers the aesthetics and sexuality of space as manifested by UFO sightings and abduction scenarios.
Author : Leonard Forrer
Publisher :
Page : 750 pages
File Size : 45,84 MB
Release : 1916
Category : Medalists
ISBN :
Author : William Bell Mitchell
Publisher :
Page : 928 pages
File Size : 27,39 MB
Release : 1915
Category : Stearns County (Minn.)
ISBN :
Author : Clarke Hess
Publisher : Schiffer Book for Collectors
Page : 202 pages
File Size : 19,56 MB
Release : 2002
Category : Antiques & Collectibles
ISBN :
The rich and diverse arts practiced by the distinctive Mennonite communities in Europe, Pennsylvania, and Canada over a 300-year period are presented. A host of newly recognized Mennonite artisans of traditional quilts, furniture, wood carvings, and fraktur, are introduced, and many are displayed here in the hundreds of color images.
Author : Harry Allen Eisenbise
Publisher :
Page : 144 pages
File Size : 42,93 MB
Release : 1917
Category :
ISBN :
Author : Horace Avery Abell
Publisher :
Page : 218 pages
File Size : 18,78 MB
Release : 1919
Category : Abel family (Robert Abell, d. 1663)
ISBN :
Author : Jonathan V. Plaut
Publisher : Dundurn
Page : 323 pages
File Size : 13,97 MB
Release : 2007-05-30
Category : Religion
ISBN : 1550029428
Beginning with the first Jewish settler, Moses David, the important role that Windsor Jews played in the development of Ontario's south is mirrored in this 200-year chronicle. the founding pioneer families transformed their Eastern European shtetl into a North American settlement; many individuals were involved in establishing synagogues, schools, and an organized communal structure in spite of divergent religious, political, and economic interests. Modernity and the growing influences of Zionism and Conservative/Reform Judaism challenged the traditional and leftist leanings of the community's founders. From the outset, Jews were represented in city council, actively involved in communal organizations, and appointed to judicial posts. While its Jewish population was small, Windsor boasted Canada's first Jewish Cabinet members, provincially and federally, in David Croll and Herb Gray. As the new millennium approached, jews faced shrinking numbers, forcing major consolidations in order to ensure their survival.
Author : Q. David Bowers
Publisher :
Page : 224 pages
File Size : 44,49 MB
Release : 2019-08
Category :
ISBN : 9780578529318
Author : Elizabeth D. Zwicky
Publisher : "O'Reilly Media, Inc."
Page : 897 pages
File Size : 15,75 MB
Release : 2000-06-26
Category : Computers
ISBN : 0596551886
In the five years since the first edition of this classic book was published, Internet use has exploded. The commercial world has rushed headlong into doing business on the Web, often without integrating sound security technologies and policies into their products and methods. The security risks--and the need to protect both business and personal data--have never been greater. We've updated Building Internet Firewalls to address these newer risks. What kinds of security threats does the Internet pose? Some, like password attacks and the exploiting of known security holes, have been around since the early days of networking. And others, like the distributed denial of service attacks that crippled Yahoo, E-Bay, and other major e-commerce sites in early 2000, are in current headlines. Firewalls, critical components of today's computer networks, effectively protect a system from most Internet security threats. They keep damage on one part of the network--such as eavesdropping, a worm program, or file damage--from spreading to the rest of the network. Without firewalls, network security problems can rage out of control, dragging more and more systems down. Like the bestselling and highly respected first edition, Building Internet Firewalls, 2nd Edition, is a practical and detailed step-by-step guide to designing and installing firewalls and configuring Internet services to work with a firewall. Much expanded to include Linux and Windows coverage, the second edition describes: Firewall technologies: packet filtering, proxying, network address translation, virtual private networks Architectures such as screening routers, dual-homed hosts, screened hosts, screened subnets, perimeter networks, internal firewalls Issues involved in a variety of new Internet services and protocols through a firewall Email and News Web services and scripting languages (e.g., HTTP, Java, JavaScript, ActiveX, RealAudio, RealVideo) File transfer and sharing services such as NFS, Samba Remote access services such as Telnet, the BSD "r" commands, SSH, BackOrifice 2000 Real-time conferencing services such as ICQ and talk Naming and directory services (e.g., DNS, NetBT, the Windows Browser) Authentication and auditing services (e.g., PAM, Kerberos, RADIUS); Administrative services (e.g., syslog, SNMP, SMS, RIP and other routing protocols, and ping and other network diagnostics) Intermediary protocols (e.g., RPC, SMB, CORBA, IIOP) Database protocols (e.g., ODBC, JDBC, and protocols for Oracle, Sybase, and Microsoft SQL Server) The book's complete list of resources includes the location of many publicly available firewall construction tools.